
Ad Unit (2345678901)
Uranium Finance hack charges have turned one of DeFi's ugliest 2021 blowups into a live criminal case. The U.S. Attorney's Office for the Southern District of New York said March 30 that Jonathan Spalletta, a Maryland resident, was charged with computer fraud and money laundering over two April 2021 attacks on Uranium Finance that prosecutors say drained more than $54 million and helped kill the exchange.
What happened in the Uranium Finance case
According to the DOJ press release, Spalletta is accused of carrying out two separate attacks against Uranium Finance in April 2021. Prosecutors say the first attack on April 8 extracted about $1.4 million in rewards tokens, after which Uranium allegedly let him keep about $386,000 as a sham "bug bounty" in exchange for returning the rest. The second attack on April 28 was far more destructive. DOJ says he exploited a flaw across 26 liquidity pools and fraudulently obtained about $53.3 million in cryptocurrency, forcing Uranium to shut down for lack of funds. The indictment identifies him by the aliases "Cthulhon" and "Jspalletta," and says he later laundered stolen assets through a series of crypto transactions, including Tornado Cash. Prosecutors also say he spent proceeds on high-end collectibles, including a Black Lotus Magic card, sealed Pokemon products, rare Roman coins, and other items later seized from his residence. The same press release says law enforcement separately seized about $31 million in crypto tied to the case in February 2025. Those are still allegations, not findings of guilt, and DOJ states clearly that Spalletta is presumed innocent unless proven guilty.
Why Uranium Finance hack charges matter beyond one old exploit
The bigger story is not that prosecutors finally named a suspect. It is how they framed the conduct. This case shows the U.S. government is prepared to treat at least some smart contract exploits not as gray-area "code is law" episodes, but as straight fraud and laundering when the alleged facts show deceptive intent, repeated extraction, concealment, and post-hack laundering. DOJ leaned on more than the exploit itself. It cited an alleged written message in which Spalletta described a "crypto heist" and said "Crypto is all fake internet money anyway," plus the alleged use of Tornado Cash and spending on collectibles. That combination gives prosecutors a cleaner narrative than many DeFi exploits offer. For builders and traders, that matters because enforcement risk now turns less on whether an attacker touched a smart contract and more on how the conduct looks when reconstructed end to end: intent, deception, negotiation, retention of funds, obfuscation, and spending. That approach mirrors a broader pattern in U.S. crypto enforcement, where asset tracing and post-incident behavior often matter as much as the original technical act.
How the Uranium exploit worked
The indictment and later technical analyses point to two different weaknesses. The more famous April 28 attack was tied to an arithmetic bug in Uranium's modified Uniswap-style pair contract. The indictment says Uranium incorrectly used the number 1,000 where it should have used 10,000 in code checking whether transactions were permissible, which allowed the attacker to request far more funds than he was entitled to receive. One example in the indictment says a pool with around 69,000 U92 tokens and about 2,232,000 BUSD could be drained after the attacker deposited essentially zero-value amounts and requested roughly 88% of the pool's U92 and roughly 90% of its BUSD. Immunefi's post-mortem reaches the same core conclusion in more technical language: Uranium altered the fee-scaling logic from Uniswap V2, but failed to update the invariant check consistently, making the post-swap balance test appear about 100 times stronger than it really was. An academic review of DeFi incidents later categorized Uranium Finance as an arithmetic vulnerability case and cited the faulty balance calculation as the root reason the protocol lost around $50 million. This was not a sophisticated bridge exploit or a multi-sig compromise. The money trail and recovery effort changed the case A lot of old DeFi hacks fade into folklore because nobody gets named and little is recovered. That did not happen here. TRM Labs said in February 2025 that U.S. authorities had seized about $31 million related to the Uranium Finance exploits, nearly four years after the thefts. TRM said the first exploit involved roughly $1.4 million, with about $385,500 retained by the attacker after negotiations, while the second exploit drained roughly $52 million. It also said investigators traced laundering through Tornado Cash, decentralized exchanges, cross-chain swaps, and later movement into bitcoin before seizure. DOJ's March 2026 announcement lines up with the seizure figure and adds the criminal charges. That sequence matters because it shows how much more patient and capable blockchain investigations have become. Dormant wallets are not dead ends anymore. Long delays do not necessarily shield exploit proceeds from tracing, especially when funds interact with mixers, swaps, and later off-chain purchases. For victims, the practical result is mixed: partial recovery is better than none, but it still leaves a massive gap between the original losses and what authorities seized. For exploiters, the lesson is harsher.
Who is affected and what this case reveals about DeFi risk
The immediate victims were Uranium users and liquidity providers. The longer-term victims are any DeFi teams still treating audits, forks, and version changes as routine engineering chores rather than existential risk. Uranium was a fork of Uniswap V2 on BNB Chain, and the technical writeups are blunt: the fatal issue came from changes Uranium introduced itself. That detail keeps repeating across DeFi history. Mature code gets copied, small modifications get made under deadline pressure, and tiny arithmetic or logic changes create catastrophic attack surfaces. This is why the Uranium case still matters in 2026 even though the exploit happened in 2021. It fits a durable pattern. The problem was not only the bug. It was shipping production code without fully understanding the implications of deviating from battle-tested logic. The indictment also adds a governance lesson. After the first exploit, Uranium allegedly entered a deal that let the attacker keep part of the stolen funds as a fake bounty . Weeks later, prosecutors say, the same person came back and drained far more. That is a brutal warning for protocol teams tempted to improvise with attackers instead of locking systems down, preserving evidence, and coordinating with investigators.
What to watch next in the Spalletta prosecution
Three things matter from here. First, whether prosecutors can convert a technically dense DeFi exploit into a jury-ready fraud story without losing precision. Second, whether additional forfeiture or restitution action emerges beyond the $31 million seizure already disclosed by DOJ and TRM. Third, whether the defense tests the boundary between exploit, unauthorized taking, and bug bounty-style negotiation in a way that forces the court to say more about where lawful security research ends and criminal extraction begins. The case is also worth watching because it is assigned in SDNY, one of the most influential venues in U.S. financial and crypto enforcement. If prosecutors succeed, the Uranium case will become a reference point whenever future DeFi exploit defendants claim they merely interacted with public code as written. If the government struggles, defense lawyers in later crypto cases will study that too. For now, the cleanest takeaway is this: once an exploit includes concealment, laundering, and spending, the "it was just a smart contract interaction" defense gets much weaker. The Uranium Finance hack is no longer just a post-mortem. It is now a prosecution. The next date that matters is not an on-chain move but the court calendar, because this case could help define how U.S. authorities treat smart contract abuse for years.
Reference Desk
Sources & References
Ad Unit (3456789012)
Staff byline for desk-edited coverage published by Cryptic Daily.
Continue Reading
Related Articles
Additional reporting and adjacent stories connected to this topic.
about 4 hours ago
Resolv Labs AWS KMS Exploit: How a Compromised Key Minted $25M in USR
On March 22, a compromised AWS KMS key let attackers mint 80M USR for $200K in USDC. The depeg spread bad debt across Morpho Blue, Euler, and Fluid.

Yesterday
Balancer V2 Rounding Exploit: $128M Drained in 30 Minutes
On November 3, 2025, an attacker drained $128M from Balancer V2 Composable Stable Pools across six blockchains in under 30 minutes — using a rounding error that survived 11 audits.

Mar 31, 2026
UK Xinbi Sanctions: Anatomy of Scam-Centre Infrastructure
Britain’s Xinbi sanctions treat crypto fraud as industrial infrastructure: marketplaces, compounds, trafficked labor, and property networks working together.



